Explore a set of behavioral forensic case studies developed to simulate real-world criminal patterns using mobile device logs, location trails, and app usage analysis.
High call frequency, GPS clustering in red zones, encrypted chats. CSV-based simulation analyzed using SIEM dashboards.
View LogsSudden app access spikes, suspicious banking terms, VPN activity, and flagged transaction keywords.
View LogsPrivileged access at odd hours, internal data sharing, and device activity logs matched with user profiles.
View LogsSMS phishing, impersonation attempts, response tracking, and metadata anomalies.
View LogsRepeated GPS overlap, app usage timing, frequent SMS with flagged keywords.
View LogsMessaging on Telegram, WhatsApp, frequent resume uploads, Bitcoin wallet detections in logs.
View Logs